首页 > 最新文献

Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks最新文献

英文 中文
Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? Android应用程序可以被识别仅使用TCP/IP头的启动时间流量?
Hasan Faik Alan, J. Kaur
The ability to identify mobile apps in network traffic has significant implications in many domains, including traffic management, malware detection, and maintaining user privacy. App identification methods in the literature typically use deep packet inspection (DPI) and analyze HTTP headers to extract app fingerprints. However, these methods cannot be used if HTTP traffic is encrypted. We investigate whether Android apps can be identified from their launch-time network traffic using only TCP/IP headers. We first capture network traffic of 86,109 app launches by repeatedly running 1,595 apps on 4 distinct Android devices. We then use supervised learning methods used previously in the web page identification literature, to identify the apps that generated the traffic. We find that: (i) popular Android apps can be identified with 88% accuracy, by using the packet sizes of the first 64 packets they generate, when the learning methods are trained and tested on the data collected from same device; (ii) when the data from an unseen device (but similar operating system/vendor) is used for testing, the apps can be identified with 67% accuracy; (iii) the app identification accuracy does not drop significantly even if the training data are stale by several days, and (iv) the accuracy does drop quite significantly if the operating system/vendor is very different. We discuss the implications of our findings as well as open issues.
在网络流量中识别移动应用程序的能力在许多领域都具有重要意义,包括流量管理、恶意软件检测和维护用户隐私。文献中的应用识别方法通常使用深度包检测(DPI)和分析HTTP标头来提取应用指纹。但是,如果HTTP流量是加密的,则不能使用这些方法。我们调查Android应用程序是否可以通过仅使用TCP/IP报头从其启动时网络流量中识别出来。我们首先通过在4个不同的Android设备上重复运行1595个应用来获取86109个应用启动的网络流量。然后,我们使用之前在网页识别文献中使用的监督学习方法来识别产生流量的应用程序。我们发现:(i)当学习方法在同一设备收集的数据上进行训练和测试时,通过使用它们生成的前64个数据包的数据包大小,可以识别出流行的Android应用程序,准确率为88%;(ii)当使用来自未见过的设备(但类似的操作系统/供应商)的数据进行测试时,应用程序的识别准确率可以达到67%;(iii)即使训练数据过期几天,应用识别准确率也不会显著下降;(iv)如果操作系统/供应商差异很大,准确率确实会显著下降。我们讨论了我们的发现的含义以及开放的问题。
{"title":"Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic?","authors":"Hasan Faik Alan, J. Kaur","doi":"10.1145/2939918.2939929","DOIUrl":"https://doi.org/10.1145/2939918.2939929","url":null,"abstract":"The ability to identify mobile apps in network traffic has significant implications in many domains, including traffic management, malware detection, and maintaining user privacy. App identification methods in the literature typically use deep packet inspection (DPI) and analyze HTTP headers to extract app fingerprints. However, these methods cannot be used if HTTP traffic is encrypted. We investigate whether Android apps can be identified from their launch-time network traffic using only TCP/IP headers. We first capture network traffic of 86,109 app launches by repeatedly running 1,595 apps on 4 distinct Android devices. We then use supervised learning methods used previously in the web page identification literature, to identify the apps that generated the traffic. We find that: (i) popular Android apps can be identified with 88% accuracy, by using the packet sizes of the first 64 packets they generate, when the learning methods are trained and tested on the data collected from same device; (ii) when the data from an unseen device (but similar operating system/vendor) is used for testing, the apps can be identified with 67% accuracy; (iii) the app identification accuracy does not drop significantly even if the training data are stale by several days, and (iv) the accuracy does drop quite significantly if the operating system/vendor is very different. We discuss the implications of our findings as well as open issues.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Detecting SMS Spam in the Age of Legitimate Bulk Messaging 在合法批量消息时代检测垃圾短信
Bradley Reaves, Logan Blue, D. Tian, Patrick Traynor, Kevin R. B. Butler
Text messaging is used by more people around the world than any other communications technology. As such, it presents a desirable medium for spammers. While this problem has been studied by many researchers over the years, the recent increase in legitimate bulk traffic (e.g., account verification, 2FA, etc.) has dramatically changed the mix of traffic seen in this space, reducing the effectiveness of previous spam classification efforts. This paper demonstrates the performance degradation of those detectors when used on a large-scale corpus of text messages containing both bulk and spam messages. Against our labeled dataset of text messages collected over 14 months, the precision and recall of past classifiers fall to 23.8% and 61.3% respectively. However, using our classification techniques and labeled clusters, precision and recall rise to 100% and 96.8%. We not only show that our collected dataset helps to correct many of the overtraining errors seen in previous studies, but also present insights into a number of current SMS spam campaigns.
世界上使用短信的人比使用其他任何通信技术的人都多。因此,它为垃圾邮件发送者提供了理想的媒介。虽然这个问题已经被许多研究人员研究了多年,但最近合法的批量流量(例如,帐户验证,2FA等)的增加极大地改变了这个领域中看到的流量组合,降低了以前垃圾邮件分类工作的有效性。本文演示了在包含大量和垃圾消息的大规模文本消息语料库上使用这些检测器时的性能下降。对于我们收集的超过14个月的标记短信数据集,过去分类器的准确率和召回率分别下降到23.8%和61.3%。然而,使用我们的分类技术和标记聚类,准确率和召回率分别提高到100%和96.8%。我们不仅表明我们收集的数据集有助于纠正以前研究中看到的许多过度训练错误,而且还提供了对当前SMS垃圾邮件活动的一些见解。
{"title":"Detecting SMS Spam in the Age of Legitimate Bulk Messaging","authors":"Bradley Reaves, Logan Blue, D. Tian, Patrick Traynor, Kevin R. B. Butler","doi":"10.1145/2939918.2939937","DOIUrl":"https://doi.org/10.1145/2939918.2939937","url":null,"abstract":"Text messaging is used by more people around the world than any other communications technology. As such, it presents a desirable medium for spammers. While this problem has been studied by many researchers over the years, the recent increase in legitimate bulk traffic (e.g., account verification, 2FA, etc.) has dramatically changed the mix of traffic seen in this space, reducing the effectiveness of previous spam classification efforts. This paper demonstrates the performance degradation of those detectors when used on a large-scale corpus of text messages containing both bulk and spam messages. Against our labeled dataset of text messages collected over 14 months, the precision and recall of past classifiers fall to 23.8% and 61.3% respectively. However, using our classification techniques and labeled clusters, precision and recall rise to 100% and 96.8%. We not only show that our collected dataset helps to correct many of the overtraining errors seen in previous studies, but also present insights into a number of current SMS spam campaigns.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4 剖析自定义协议:基于IEEE 802.15.4的自定义协议自动分析
Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi, Yongdae Kim
IEEE 802.15.4 is widely used as lower layers for not only wellknown wireless communication standards such as ZigBee, 6LoWPAN, and WirelessHART, but also customized protocols developed by manufacturers, particularly for various Internet of Things (IoT) devices. Customized protocols are not usually publicly disclosed nor standardized. Moreover, unlike textual protocols (e.g., HTTP, SMTP, POP3.), customized protocols for IoT devices provide no clues such as strings or keywords that are useful for analysis. Instead, they use bits or bytes to represent header and body information in order to save power and bandwidth. On the other hand, they often do not employ encryption, fragmentation, or authentication to save cost and effort in implementations. In other words, their security relies only on the confidentiality of the protocol itself. In this paper, we introduce a novel methodology to analyze and reconstruct unknown wireless customized protocols over IEEE 802.15.4. Based on this methodology, we develop an automatic analysis and spoofing tool called WPAN automatic spoofer (WASp) that can be used to understand and reconstruct customized protocols to byte-level accuracy, and to generate packets that can be used for verification of analysis results or spoofing attacks. The methodology consists of four phases: packet collection, packet grouping, protocol analysis, and packet generation. Except for the packet collection step, all steps are fully automated. Although the use of customized protocols is also unknown before the collecting phase, we choose two real-world target systems for evaluation: the smart plug system and platform screen door (PSD) to evaluate our methodology and WASp. In the evaluation, 7,299 and 217 packets are used as datasets for both target systems, respectively. As a result, on average, WASp is found to reduce entropy of legitimate message space by 93.77% and 88.11% for customized protocols used in smart plug and PSD systems, respectively. In addition, on average, 48.19% of automatically generated packets are successfully spoofed for the first target systems.
IEEE 802.15.4不仅被广泛用作ZigBee、6LoWPAN和WirelessHART等知名无线通信标准的底层,而且还被制造商开发的定制协议广泛使用,特别是用于各种物联网(IoT)设备。定制协议通常不会公开披露,也不会标准化。此外,与文本协议(如HTTP、SMTP、POP3)不同,物联网设备的自定义协议不提供对分析有用的字符串或关键字等线索。相反,它们使用位或字节来表示报头和正文信息,以节省功率和带宽。另一方面,它们通常不使用加密、分段或身份验证来节省实现的成本和工作量。换句话说,它们的安全性仅依赖于协议本身的机密性。在本文中,我们介绍了一种新的方法来分析和重构IEEE 802.15.4上未知的无线自定义协议。基于这种方法,我们开发了一种自动分析和欺骗工具,称为WPAN自动欺骗(WASp),可用于理解和重构定制协议,达到字节级精度,并生成可用于验证分析结果或欺骗攻击的数据包。该方法包括四个阶段:数据包收集、数据包分组、协议分析和数据包生成。除了包收集步骤外,所有步骤都是完全自动化的。尽管在收集阶段之前,定制协议的使用也是未知的,但我们选择了两个现实世界的目标系统进行评估:智能插头系统和平台屏蔽门(PSD),以评估我们的方法和WASp。在评估中,分别使用7,299和217个数据包作为两个目标系统的数据集。结果发现,对于智能插头和PSD系统中使用的定制协议,WASp平均将合法消息空间的熵分别减少了93.77%和88.11%。此外,平均而言,48.19%的自动生成的数据包被第一个目标系统成功欺骗。
{"title":"Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4","authors":"Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi, Yongdae Kim","doi":"10.1145/2939918.2939921","DOIUrl":"https://doi.org/10.1145/2939918.2939921","url":null,"abstract":"IEEE 802.15.4 is widely used as lower layers for not only wellknown wireless communication standards such as ZigBee, 6LoWPAN, and WirelessHART, but also customized protocols developed by manufacturers, particularly for various Internet of Things (IoT) devices. Customized protocols are not usually publicly disclosed nor standardized. Moreover, unlike textual protocols (e.g., HTTP, SMTP, POP3.), customized protocols for IoT devices provide no clues such as strings or keywords that are useful for analysis. Instead, they use bits or bytes to represent header and body information in order to save power and bandwidth. On the other hand, they often do not employ encryption, fragmentation, or authentication to save cost and effort in implementations. In other words, their security relies only on the confidentiality of the protocol itself. In this paper, we introduce a novel methodology to analyze and reconstruct unknown wireless customized protocols over IEEE 802.15.4. Based on this methodology, we develop an automatic analysis and spoofing tool called WPAN automatic spoofer (WASp) that can be used to understand and reconstruct customized protocols to byte-level accuracy, and to generate packets that can be used for verification of analysis results or spoofing attacks. The methodology consists of four phases: packet collection, packet grouping, protocol analysis, and packet generation. Except for the packet collection step, all steps are fully automated. Although the use of customized protocols is also unknown before the collecting phase, we choose two real-world target systems for evaluation: the smart plug system and platform screen door (PSD) to evaluate our methodology and WASp. In the evaluation, 7,299 and 217 packets are used as datasets for both target systems, respectively. As a result, on average, WASp is found to reduce entropy of legitimate message space by 93.77% and 88.11% for customized protocols used in smart plug and PSD systems, respectively. In addition, on average, 48.19% of automatically generated packets are successfully spoofed for the first target systems.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131149193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
POSTER: Security Design Patterns With Good Usability 海报:具有良好可用性的安全设计模式
H. Hof, Gudrun Socher
This poster presents work-in-progress in the field of usable security. The usability of security mechanisms is crucial to avoid unintended misuse of security mechanisms which lowers the security level of a system. It is the goal of the work presented in this poster to identify security design patterns with good usability. Requirements for security design patterns with good usability stem from existing usable security design guidelines. A collection of security usability failures is presented as well as examples of how misuse anti-patterns can be derived from these failures. Misuse cases will be used in future work to identify security design patterns with good usability.
这张海报展示了可用性安全领域正在进行的工作。安全机制的可用性对于避免意外误用安全机制至关重要,这会降低系统的安全级别。本文的目标是确定具有良好可用性的安全设计模式。对具有良好可用性的安全设计模式的需求源于现有可用的安全设计指南。介绍了一系列安全可用性失败,以及如何从这些失败中派生出滥用反模式的示例。误用案例将在未来的工作中使用,以确定具有良好可用性的安全设计模式。
{"title":"POSTER: Security Design Patterns With Good Usability","authors":"H. Hof, Gudrun Socher","doi":"10.1145/2939918.2942423","DOIUrl":"https://doi.org/10.1145/2939918.2942423","url":null,"abstract":"This poster presents work-in-progress in the field of usable security. The usability of security mechanisms is crucial to avoid unintended misuse of security mechanisms which lowers the security level of a system. It is the goal of the work presented in this poster to identify security design patterns with good usability. Requirements for security design patterns with good usability stem from existing usable security design guidelines. A collection of security usability failures is presented as well as examples of how misuse anti-patterns can be derived from these failures. Misuse cases will be used in future work to identify security design patterns with good usability.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125008233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evading Android Runtime Analysis Through Detecting Programmed Interactions 通过检测程序交互逃避Android运行时分析
Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang
Dynamic analysis technique has been widely used in Android malware detection. Previous works on evading dynamic analysis focus on discovering the fingerprints of emulators. However, such method has been challenged since the introduction of real devices in recent works. In this paper, we propose a new approach to evade automated runtime analysis through detecting programmed interactions. This approach, in essence, tries to tell the identity of the current app controller (human user or automated exploration tool), by finding intrinsic differences between human user and machine tester in interaction patterns. The effectiveness of our approach has been demonstrated through evaluation against 11 real-world online dynamic analysis services.
动态分析技术在Android恶意软件检测中得到了广泛应用。以往关于规避动态分析的工作主要集中在发现仿真器的指纹。然而,在最近的作品中,由于实际装置的引入,这种方法受到了挑战。在本文中,我们提出了一种通过检测程序交互来逃避自动运行时分析的新方法。从本质上讲,这种方法试图通过发现人类用户和机器测试人员在交互模式上的内在差异来识别当前应用控制器(人类用户或自动探索工具)的身份。通过对11个现实世界在线动态分析服务的评估,证明了我们方法的有效性。
{"title":"Evading Android Runtime Analysis Through Detecting Programmed Interactions","authors":"Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang","doi":"10.1145/2939918.2939926","DOIUrl":"https://doi.org/10.1145/2939918.2939926","url":null,"abstract":"Dynamic analysis technique has been widely used in Android malware detection. Previous works on evading dynamic analysis focus on discovering the fingerprints of emulators. However, such method has been challenged since the introduction of real devices in recent works. In this paper, we propose a new approach to evade automated runtime analysis through detecting programmed interactions. This approach, in essence, tries to tell the identity of the current app controller (human user or automated exploration tool), by finding intrinsic differences between human user and machine tester in interaction patterns. The effectiveness of our approach has been demonstrated through evaluation against 11 real-world online dynamic analysis services.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122519564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise Slogger:粉碎运动为基础的触控记录与透明的系统噪音
Prakash Shrestha, Manar Mohamed, Nitesh Saxena
Recent research shows that it is possible to infer a user's touchscreen inputs (e.g., passwords) on Android devices based on inertial (motion/position) sensors, currently freely-accessible by any Android app. Given the high accuracies of such touchstroke logging attacks, they are now considered a significant threat to user privacy. Consequently, the security community has started exploring defenses to such side channel attacks, but the suggested solutions are either not effective (e.g., those based on vibrational noise) and/or may significantly undermine system usability (e.g., those based on keyboard layout randomization). In this paper, we introduce a novel and practical defense to motion-based touchstroke leakage based on system-generated, fully automated and user-oblivious sensory noise. Our defense leverages a recently developed framework, SMASheD, that takes advantage of the Android's ADB functionality and can programmatically inject noise to various inertial sensors. Although SMASheD was originally advertised as a malicious app by its authors, we use it to build a defense mechanism, called Slogger ("Smashing the logger"), for defeating sensor-based touchstroke logging attacks. Slogger transparently inserts noisy sensor readings in the background as the user provides sensitive touchscreen input (e.g., password, PIN or credit card info) in order to obfuscate the original sensor readings. It can be installed in the user space without the need to root the device and to change the device's OS or kernel. Our contributions are three-fold. First, we introduce Slogger, identifying a novel, benign use case of SMASheD that can defeat touchstroke logging attacks. Second, we design and implement the Slogger app system that can be used to protect sensitive touchscreen input from leaking away. Third, we comprehensively evaluate Slogger against state-of-the-art touchstroke detection and inference attacks. Our results show that Slogger can significantly reduce the level of touchstroke leakage to the extent these attacks may become unworkable in practice, without affecting other benign apps. We also show that the leakage can be minimized even when attacks utilize a fusion of multiple motion-position sensors.
最近的研究表明,根据惯性(运动/位置)传感器,可以推断出用户在Android设备上的触摸屏输入(例如密码),目前任何Android应用程序都可以自由访问。鉴于这种触控日志攻击的高精度,它们现在被认为是对用户隐私的重大威胁。因此,安全社区已经开始探索对此类侧信道攻击的防御,但建议的解决方案要么无效(例如,基于振动噪声的解决方案),要么可能显著破坏系统可用性(例如,基于键盘布局随机化的解决方案)。在本文中,我们介绍了一种新颖实用的基于系统生成、全自动和用户无关的感知噪声的基于运动的触控泄漏防御方法。我们的防御利用了最近开发的框架,该框架利用了Android的ADB功能,可以通过编程向各种惯性传感器注入噪声。尽管smash最初被其作者宣传为恶意应用程序,但我们使用它来构建一个名为Slogger(“Smashing the logger”)的防御机制,以击败基于传感器的触控日志攻击。Slogger透明地在后台插入噪声传感器读数,因为用户提供敏感的触摸屏输入(例如,密码,PIN或信用卡信息),以混淆原始传感器读数。它可以安装在用户空间中,而不需要对设备进行root操作,也不需要更改设备的操作系统或内核。我们的贡献有三方面。首先,我们介绍Slogger,确定了一个新的、良性的用例,可以击败触控日志攻击。其次,我们设计并实现了Slogger应用程序系统,可以用来保护敏感的触摸屏输入不泄漏。第三,我们全面评估了Slogger对最先进的触碰检测和推理攻击的能力。我们的研究结果表明,Slogger可以显著降低触控泄漏的程度,使这些攻击在实践中变得不可行的程度,而不会影响其他良性应用程序。我们还表明,即使攻击利用多个运动位置传感器的融合,泄漏也可以最小化。
{"title":"Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise","authors":"Prakash Shrestha, Manar Mohamed, Nitesh Saxena","doi":"10.1145/2939918.2939924","DOIUrl":"https://doi.org/10.1145/2939918.2939924","url":null,"abstract":"Recent research shows that it is possible to infer a user's touchscreen inputs (e.g., passwords) on Android devices based on inertial (motion/position) sensors, currently freely-accessible by any Android app. Given the high accuracies of such touchstroke logging attacks, they are now considered a significant threat to user privacy. Consequently, the security community has started exploring defenses to such side channel attacks, but the suggested solutions are either not effective (e.g., those based on vibrational noise) and/or may significantly undermine system usability (e.g., those based on keyboard layout randomization). In this paper, we introduce a novel and practical defense to motion-based touchstroke leakage based on system-generated, fully automated and user-oblivious sensory noise. Our defense leverages a recently developed framework, SMASheD, that takes advantage of the Android's ADB functionality and can programmatically inject noise to various inertial sensors. Although SMASheD was originally advertised as a malicious app by its authors, we use it to build a defense mechanism, called Slogger (\"Smashing the logger\"), for defeating sensor-based touchstroke logging attacks. Slogger transparently inserts noisy sensor readings in the background as the user provides sensitive touchscreen input (e.g., password, PIN or credit card info) in order to obfuscate the original sensor readings. It can be installed in the user space without the need to root the device and to change the device's OS or kernel. Our contributions are three-fold. First, we introduce Slogger, identifying a novel, benign use case of SMASheD that can defeat touchstroke logging attacks. Second, we design and implement the Slogger app system that can be used to protect sensitive touchscreen input from leaking away. Third, we comprehensively evaluate Slogger against state-of-the-art touchstroke detection and inference attacks. Our results show that Slogger can significantly reduce the level of touchstroke leakage to the extent these attacks may become unworkable in practice, without affecting other benign apps. We also show that the leakage can be minimized even when attacks utilize a fusion of multiple motion-position sensors.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132354404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs 海报:利用动态部分重构提高对fpga功率分析攻击的抵抗力
Ghada Dessouky, A. Sadeghi
FPGA devices are increasingly deployed in wireless and heterogeneous networks in-field due to their re-programmable nature and high performance. Modern FPGA devices can have part of their logic partially reconfigured during runtime operation, which we propose to exploit to realize a general-purpose, flexible and reconfigurable DPA countermeasure that can be integrated into any FPGA-based system, irrespective of the cryptographic algorithm or implementation. We propose a real-time dynamic closed-loop on-chip noise generation countermeasure which consists of an on-chip power monitor coupled with a low-overhead Gaussian noise generator. The noise generator is reconfigured continuously to update its generated noise amplitude and variance so that is sufficiently hides the computation power consumption. Our scheme and its integration onto an SoC is presented as well as our proposal for evaluating its effectiveness and overhead.
FPGA器件由于其可编程特性和高性能,越来越多地应用于现场无线和异构网络中。现代FPGA设备可以在运行时操作期间部分重新配置其部分逻辑,我们建议利用这一点来实现通用,灵活和可重构的DPA对策,该对策可以集成到任何基于FPGA的系统中,而不考虑加密算法或实现。我们提出了一种实时动态闭环片上噪声产生对策,该对策由片上功率监测器和低开销高斯噪声发生器组成。不断地重新配置噪声发生器以更新其产生的噪声幅值和方差,从而充分地隐藏了计算功耗。我们的方案及其集成到SoC上,以及我们评估其有效性和开销的建议。
{"title":"POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs","authors":"Ghada Dessouky, A. Sadeghi","doi":"10.1145/2939918.2942426","DOIUrl":"https://doi.org/10.1145/2939918.2942426","url":null,"abstract":"FPGA devices are increasingly deployed in wireless and heterogeneous networks in-field due to their re-programmable nature and high performance. Modern FPGA devices can have part of their logic partially reconfigured during runtime operation, which we propose to exploit to realize a general-purpose, flexible and reconfigurable DPA countermeasure that can be integrated into any FPGA-based system, irrespective of the cryptographic algorithm or implementation. We propose a real-time dynamic closed-loop on-chip noise generation countermeasure which consists of an on-chip power monitor coupled with a low-overhead Gaussian noise generator. The noise generator is reconfigured continuously to update its generated noise amplitude and variance so that is sufficiently hides the computation power consumption. Our scheme and its integration onto an SoC is presented as well as our proposal for evaluating its effectiveness and overhead.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android 利用数据使用统计数据对Android进行网站指纹攻击
Raphael Spreitzer, Simone Griesmayr, Thomas Korak, S. Mangard
The browsing behavior of a user allows to infer personal details, such as health status, political interests, sexual orientation, etc. In order to protect this sensitive information and to cope with possible privacy threats, defense mechanisms like SSH tunnels and anonymity networks (e.g., Tor) have been established. A known shortcoming of these defenses is that website fingerprinting attacks allow to infer a user's browsing behavior based on traffic analysis techniques. However, website fingerprinting typically assumes access to the client's network or to a router near the client, which restricts the applicability of these attacks. In this work, we show that this rather strong assumption is not required for website fingerprinting attacks. Our client-side attack overcomes several limitations and assumptions of network-based fingerprinting attacks, e.g., network conditions and traffic noise, disabled browser caches, expensive training phases, etc. Thereby, we eliminate assumptions used for academic purposes and present a practical attack that can be implemented easily and deployed on a large scale. Eventually, we show that an unprivileged application can infer the browsing behavior by exploiting the unprotected access to the Android data-usage statistics. More specifically, we are able to infer 97% of 2,500 page visits out of a set of 500 monitored pages correctly. Even if the traffic is routed through Tor by using the Orbot proxy in combination with the Orweb browser, we can infer 95% of 500 page visits out of a set of 100 monitored pages correctly. Thus, the READ_HISTORY_BOOKMARKS permission, which is supposed to protect the browsing behavior, does not provide protection.
用户的浏览行为允许推断个人详细信息,如健康状况、政治兴趣、性取向等。为了保护这些敏感信息并应对可能的隐私威胁,已经建立了SSH隧道和匿名网络(例如Tor)等防御机制。这些防御的一个已知缺点是,网站指纹攻击允许根据流量分析技术推断用户的浏览行为。然而,网站指纹识别通常假定访问了客户端的网络或客户端的路由器,这限制了这些攻击的适用性。在这项工作中,我们表明,这种相当强的假设是不需要网站指纹攻击。我们的客户端攻击克服了基于网络的指纹攻击的几个限制和假设,例如,网络条件和流量噪声,禁用浏览器缓存,昂贵的训练阶段等。因此,我们消除了用于学术目的的假设,并提出了一种可以轻松实现并大规模部署的实际攻击。最后,我们展示了一个无特权的应用程序可以通过利用对Android数据使用统计数据的未受保护的访问来推断浏览行为。更具体地说,我们能够从500个监控页面中正确推断出2500个页面访问中的97%。即使流量通过使用Orbot代理和Orweb浏览器通过Tor路由,我们也可以从100个被监控的页面中正确推断出95%的500个页面访问。因此,应该保护浏览行为的READ_HISTORY_BOOKMARKS权限并没有提供保护。
{"title":"Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android","authors":"Raphael Spreitzer, Simone Griesmayr, Thomas Korak, S. Mangard","doi":"10.1145/2939918.2939922","DOIUrl":"https://doi.org/10.1145/2939918.2939922","url":null,"abstract":"The browsing behavior of a user allows to infer personal details, such as health status, political interests, sexual orientation, etc. In order to protect this sensitive information and to cope with possible privacy threats, defense mechanisms like SSH tunnels and anonymity networks (e.g., Tor) have been established. A known shortcoming of these defenses is that website fingerprinting attacks allow to infer a user's browsing behavior based on traffic analysis techniques. However, website fingerprinting typically assumes access to the client's network or to a router near the client, which restricts the applicability of these attacks. In this work, we show that this rather strong assumption is not required for website fingerprinting attacks. Our client-side attack overcomes several limitations and assumptions of network-based fingerprinting attacks, e.g., network conditions and traffic noise, disabled browser caches, expensive training phases, etc. Thereby, we eliminate assumptions used for academic purposes and present a practical attack that can be implemented easily and deployed on a large scale. Eventually, we show that an unprivileged application can infer the browsing behavior by exploiting the unprotected access to the Android data-usage statistics. More specifically, we are able to infer 97% of 2,500 page visits out of a set of 500 monitored pages correctly. Even if the traffic is routed through Tor by using the Orbot proxy in combination with the Orweb browser, we can infer 95% of 500 page visits out of a set of 100 monitored pages correctly. Thus, the READ_HISTORY_BOOKMARKS permission, which is supposed to protect the browsing behavior, does not provide protection.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127443752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet 5G触觉互联网自适应虫洞的建设性与破坏性
Christian T. Zenger, J. Zimmer, M. Pietersz, B. Driessen, C. Paar
In this work, we constructively combine adaptive wormholes with channel-reciprocity based key establishment (CRKE), which has been proposed as a lightweight security solution for IoT devices and might be even more important for the 5G Tactile Internet and its embedded low-end devices. We present a new secret key generation protocol where two parties compute shared cryptographic keys under narrow-band multi-path fading models over a delayed digital channel. The proposed approach furthermore enables distance-bounding the key establishment process via the coherence time dependencies of the wireless channel. Our scheme is thoroughly evaluated both theoretically and practically. For the latter, we used a testbed based on the IEEE 802.15.4 standard and performed extensive experiments in a real-world manufacturing environment. Additionally, we demonstrate adaptive wormhole attacks (AWOAs) and their consequences on several physical-layer security schemes. Furthermore, we proposed a countermeasure that minimizes the risk of AWOAs.
在这项工作中,我们建设性地将自适应虫洞与基于通道互惠的密钥建立(CRKE)结合起来,这已经被提出作为物联网设备的轻量级安全解决方案,对于5G触觉互联网及其嵌入式低端设备可能更为重要。我们提出了一种新的密钥生成协议,在延迟数字信道上,双方在窄带多径衰落模型下计算共享密钥。该方法进一步通过无线信道的相干时间依赖性实现密钥建立过程的距离边界。我们的方案在理论和实践上都得到了充分的评价。对于后者,我们使用了一个基于IEEE 802.15.4标准的测试平台,并在真实的制造环境中进行了大量的实验。此外,我们还演示了自适应虫洞攻击(awoa)及其对几种物理层安全方案的影响。在此基础上,提出了降低awoa风险的对策。
{"title":"Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet","authors":"Christian T. Zenger, J. Zimmer, M. Pietersz, B. Driessen, C. Paar","doi":"10.1145/2939918.2939923","DOIUrl":"https://doi.org/10.1145/2939918.2939923","url":null,"abstract":"In this work, we constructively combine adaptive wormholes with channel-reciprocity based key establishment (CRKE), which has been proposed as a lightweight security solution for IoT devices and might be even more important for the 5G Tactile Internet and its embedded low-end devices. We present a new secret key generation protocol where two parties compute shared cryptographic keys under narrow-band multi-path fading models over a delayed digital channel. The proposed approach furthermore enables distance-bounding the key establishment process via the coherence time dependencies of the wireless channel. Our scheme is thoroughly evaluated both theoretically and practically. For the latter, we used a testbed based on the IEEE 802.15.4 standard and performed extensive experiments in a real-world manufacturing environment. Additionally, we demonstrate adaptive wormhole attacks (AWOAs) and their consequences on several physical-layer security schemes. Furthermore, we proposed a countermeasure that minimizes the risk of AWOAs.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121587126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
POSTER: Toward a Secure and Scalable Attestation 海报:迈向安全和可扩展的认证
Moreno Ambrosin, M. Conti, Ahmad Ibrahim, G. Neven, A. Sadeghi, M. Schunter
Large numbers of smart devices are permeating our environment to collect data and act on the insight derived. Examples of such devices include smart homes, factories, cars, or wearables. For privacy, security, and safety, ensuring correctness of the configuration of these devices is essential. One key mechanism to protect the software integrity of these devices is attestation. In this paper, we analyze the requirements for efficient attestation of large numbers of interconnected embedded systems. We present the first collective attestation protocol which allows attesting an unlimited number of devices. Simulation results show a run-time of 5.3 seconds in networks of 50,000 low-end embedded devices.
大量的智能设备正在渗透到我们的环境中,以收集数据并根据得出的见解采取行动。此类设备的例子包括智能家居、工厂、汽车或可穿戴设备。为了隐私、安全、安全,确保这些设备配置的正确性至关重要。保护这些设备的软件完整性的一个关键机制是认证。本文分析了大量互联嵌入式系统对高效认证的要求。我们提出了第一个集体认证协议,允许对无限数量的设备进行认证。仿真结果表明,在50,000个低端嵌入式设备的网络中,该算法的运行时间为5.3秒。
{"title":"POSTER: Toward a Secure and Scalable Attestation","authors":"Moreno Ambrosin, M. Conti, Ahmad Ibrahim, G. Neven, A. Sadeghi, M. Schunter","doi":"10.1145/2939918.2942425","DOIUrl":"https://doi.org/10.1145/2939918.2942425","url":null,"abstract":"Large numbers of smart devices are permeating our environment to collect data and act on the insight derived. Examples of such devices include smart homes, factories, cars, or wearables. For privacy, security, and safety, ensuring correctness of the configuration of these devices is essential. One key mechanism to protect the software integrity of these devices is attestation. In this paper, we analyze the requirements for efficient attestation of large numbers of interconnected embedded systems. We present the first collective attestation protocol which allows attesting an unlimited number of devices. Simulation results show a run-time of 5.3 seconds in networks of 50,000 low-end embedded devices.","PeriodicalId":387704,"journal":{"name":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134614929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1